|
||||||
|
||
|
Home > Investigation software |
|
|
21. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
22. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
23. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
24. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
25. | LeoCrystal 2.5 (leokrut.com) | ||
science. Particular interest it could be for the nanotechnology investigations permitting off site optimizing design on the molecule scale level. The creative presentation of the surface includes a three-dimensional perspective projection and stereo view. It makes this software a great illustrative toll for teaching of the concept of phase transition for the students of very broad | |||
Updated: 3, 2006 | Rating: 0 | Author: Leonid Sakharov | Size: 444 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
26. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
27. | FoldMonkey 1.46 (monkeyjob.com) | ||
FoldMonkey will help you sort, organize, archive and backup your files and folders. Main features include: Monitor a folder for new or incoming files. Rename those files to match specific criteria using tags such as old file name, old file extension and custom text. Move files to a new directory. Create | |||
Updated: 3, 2006 | Rating: 39 | Author: monkey job | Size: 1464 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
28. | COM Port Toolkit 3.6 (compt.ru) | ||
COM Port Toolkit is an integrated serial communications testing toolkit. It sends user's data to and receives one from a device and records all transfers to a log. You can test equipments serial communications protocol by hand: feed it input, check the output. You can write or use a script written by | |||
Updated: 3, 2006 | Rating: 16 | Author: Michael Golikov | Size: 1199 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
29. | PostSmile 5.1 (postsmile.com) | ||
Far too often people's e-mails are overly formal and conservative. This dooms them to be ineffective and plain boring. PostSmile is capable of adding smiley faces to any e-mail to make the message more personal and compassionate. You can Drag and Drop images and animations, smilies and emoticons, text or HTML | |||
Updated: 3, 2006 | Rating: 636 | Author: Alexey Yakshin | Size: 2158 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
30. | Ghost Hunter 5.0 (aidsoft.com) | ||
and more. This program features: Unlimitednumber of records (investigations), Print Charts, Print records, Search, Sort, Built-In Help File, Import and DisplayPhoto's for each investigation and more. This is the perfect computer program for anyone into Ghost Hunting or any other types of hauntings. This program lets yourecord detailed information such as: DATE OF | |||
Updated: 3, 2006 | Rating: 0 | Author: Robert W. Benjamin | Size: 970 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
|
Home > Investigation software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|